Boer War: A History From Beginning to End
Hourly History
A Readable Introduction to Real Mathematics
Daniel Rosenthal & David Rosenthal & Peter Rosenthal
Bad Science: Quacks, Hacks, and Big Pharma Flacks
Ben Goldacre
Empty Justice: One Hundred Years of Law, Literature and Philosophy ...
Melanie Williams
Leibniz on Time, Space, and Relativity
Richard T. W. Arthur
Erfolgsfaktor Agilität: Warum Scrum und Kanban zu zufriedenen ...
Janko Böhm
Concepts of Soft Computing
Snehashish Chakraverty & Deepti Moyi Sahoo & Nisha Rani Mahato
Knowledge Graphs and Semantic Web: First Iberoamerican Conference, ...
Boris Villazón-Terrazas & Yusniel Hidalgo-Delgado
Advances in Computer Graphics: 36th Computer Graphics International ...
Marina Gavrilova & Jian Chang & Nadia Magnenat Thalmann & Eckhard Hitzer & Hiroshi Ishikawa
AWS Certified Cloud Practitioner Study Guide: CLF-C01 Exam
Ben Piper & David Clinton
Demystifying Internet of Things Security: Successful IoT Device/Edge ...
Sunil Cheruvu & Anil Kumar & Ned Smith & David M. Wheeler
High-Performance Computing Applications in Numerical Simulation ...
Changjun Hu & Wen Yang & Congfeng Jiang & Dong Dai
Microservices in Big Data Analytics: Second International, ICETCE ...
Anil Chaudhary & Chothmal Choudhary & Mukesh Kumar Gupta & Chhagan Lal & Tapas Badal
Introducing Mechanisms and APIs for Memory Management: Using ...
Roger Villela
IoT and Edge Computing for Architects - Second Edition
Perry. Lea
Network Management in Cloud and Edge Computing
Yuchao Zhang & Ke Xu
Internet of Things (IoT): Concepts and Applications
Mansaf Alam & Kashish Ara Shakil & Samiya Khan
The Cloud-To-Thing Continuum: Opportunities and Challenges in ...
Theo Lynn & John G. Mooney & Brian Lee & Patricia Takako Endo
Edge AI: Convergence of Edge Computing and Artificial Intelligence
Xiaofei Wang & Yiwen Han & Victor C. M. Leung & Dusit Niyato & Xueqiang Yan & Xu Chen
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Fog/Edge Computing for Security, Privacy, and Applications
Wei Chang & Jie Wu
Fog, Edge, and Pervasive Computing in Intelligent IoT Driven ...
Deepak Gupta & Aditya Khamparia
Internet of Things: Enabling Technologies, Security and Social ...
Santosh Kumar Pani & Manjusha Pandey
Understanding Network Hacks: Attack and Defense With Python ...
Bastian Ballmann
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang